Skip to main content

Full text of "USPTO Patents Application 09521709"

See other formats


10/22/2003 ID 14:59 FAX 650 474 8401 GLENN PATENT GROUP 



1005/024 



REMARKS 

1 . Applicant thanks the Examiner for his remarks and observations. 

5 2. It should be appreciated that Applicant has elected to amends Claims 1 and 38 
solely for the purpose of expediting the patent application process in a manner 
consistent with the PTO's Patent Business Goals, 65 Fed. Reg. 54603 (9/8/00), In 
making such amendments, Applicant has not and does not in any way narrow the scope 
of protection to which Applicant considers the invention herein to be entitled. Rather, 

10 Applicant reserves Applicant's right to pursue such protection at a later point in time and 
merely seeks to pursue protection for the subject matter presented in this submission. 

3. Claims 1 - 6, 8-16, 18 - 21 stand rejected under 35 USC 102(b) as being 
anticipated by U.S. Patent No. 5,166,866 ("Molnar"). Applicant respectfully disagrees. 

15 

A. There is no teaching in Molnar of a software package that includes " an access 
and control portion, said access and control portion affording selective access to any 
of said first and second objects ." Molnar does teach "... execution may alternatively 
require the use of additional information that may be acquired either from the broadcast 

20 stream, from a remote site via the modem #40, or through entry of authorization 
information by the user ..." (Col. 16, line 36 to line 40); and Molnar also describes 
information being organized into "blocks", in broadcast memory, wherein each block 
includes a header to identify the block, the header operating to "convey validation 
information need to control access to the information in this or other blocks" (Col. 4, Line 

25 44 to line 61). Molnar refers here, of course, to transmission units, such as packets 
(shown in Figures 2 and 3), wherein each transmission unit includes a header. 
However, there is no teaching of an access and control portion as a distinct component 
of a multi-object software package . 



2 



Received from < 650 474 8401 > at 10122/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 ffED 15:00 FAX 650 474 8401 GLENN PATENT GROUP 



1006/024 



B. There is no teaching in Molnar of a software package that includes a notifier . 
While, Molnar does describe a header , as Indicated above, one skilled in the art, based 
on Molnar's description at Col 4, line 50 to Col, 5, line 18 would understand the header 

5 in its usual sense as a data structure that precedes the main body of the transmission 
unit, containing Information with which the transmission unit is identified. But there is no 
description of a notifier that is included as a component of a software package . 

C. There is no teaching in Molnar of " installing said software package on said 
10 buyer's computer system ." In fact Molnar specifically teaches that the preview software 

is not installed on the user's computer system, w .„ there are no hard copies of previewed 
programs (i.e. ... hard disk) " (Col 16, line 14 to line 16, emphasis added). 

D. Regarding Claim 2: There is no teaching whatsoever in Molnar of an "access and 
15 control portion " that "includes usage authorization information" that is included in the 

software package. 

E. Regarding Claims 4 and 5: While Molnar does teach storing the preview software 
on a hard disk at the transmitting unit (Col 4, line 4 to line 6, emphasis added), there Is 

20 no teaching In Molnar of "saving said software package to a mass storage device in said 
user's computer* or "wherein said mass st orage device comprises a hard disk drive ." 

F. Regarding Claim 6: There is no teaching in Molnar of " wherein said first object 
and said u sa ge authorization information are encrypted " Molnar teaches that the 

25 program offered for review "may alternatively offer restricted subsets of the features of 
purchasable version, or their execution may alternatively require the use of additional 
information..." (Col 16, line 34 to line 37). Thus, access to the software may be 
restricted, but there is no teaching that anv por tion of It Is encry pted. The header may 
also operate to " convey encryption information " (Col 4, line 58 to line 59, emphasis 

30 added). Thus, the whole transmission signal itself may be encrypted. But Molnar doesn't 

describe encryption of usage 3Mth Qrteatlon info rm at i o n. 

G. Regarding Claim 8: There is no teaching in Molnar of usage authorization 
information that "specifies any of: 



3 



Received from < 650 474 8401 > at 10122/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 ffED 15:00 FAX 650 474 8401 GLENN PATENT GROUP ' @ 007/024 



permitted uses for said software product and individual components thereoLand 
prices for said permitted uses ; 

authorized extent of use, where said extent of use comprises any of duration of 
Msg and number of uses, and prices for said authorize d extent of use : 
5 content of levels , where said software is purchased in succeeding levels and 

prices for said levels ; 

an authorized user for said software product subsequent to purchase: and 

subsequent to purchase, which of said individual components and levels have 
been purch ased, and which are still available for purchase ." Applicant is unable to find 
10 any part of the drawings and specification in Molnar that remotely teach or suggest the 
above. 

H. Regarding Claim 12; Molnar is overwhelmingly directed to a "System to 
Demonstrate and Sell Computer Programs" (title). There is no teaching in Molnar of 
15 u said data objects comprise any of diqitaLimaqes . video data objects and audio data 
objects ." Col. 3, line 41 of Molnar merely describes what the carrier wave might be. 
There is no teaching of a software package that includes video data objects . 

L Regarding Claim 16: As above, there is no teaching in Molnar of a notifier, 
20 particularly not a notifier that includes an "executable code section : and 

information required by said user for purchasing rights to said software product 
and enabling entry of tran saction information required for said purchase of said rights ." 
While Col. 15 of Molnar describes the process of purchasing software, not a single step 
of the process involves a notifier that is a component of the software package itspjf . 

25 

J. Regarding Claims 18 - 21 , as above, Molnar describes a purchase process, but 
it is not accomplished through a notifier that it itself a part of the software package, 
furthermore Molnar does not teach: 

30 "selecting one or more use options from a listing of said use options available, said 
available options b eing those objects available free of charge or those previously 



4 



Received from < 650 474 8401 >at 10122/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 WED 15:01 FAX 650 474 8401 GLENN PATENT GROUP 



©008/024 



purchased by said use r, said listing being provided by said executable code section 
accessing said usage authorization information, and wherein one or more of said 
available objects ar e retrieved by said executable code section and loaded into 
memory; and 
5 executing said requested use." 

Accordingly the rejection of Claim 1 under 35 USC § 102(b) and all Claims depending 
therefrom as being anticipated by Molnar is deemed to be improper, 

10 4. Claims 1 , 2, 6, 8 - 11 , 1 3 - 1 6, 1 8 and 1 9 stand rejected under 35 USC § 1 02(b) 
as being anticipated by U.S. Patent No. 5,224,166 ("Hartman"). Applicant respectfully 
disagrees. 

A. Although not entirely clear, the Examiner apparently relies on Col. 1 , line 5-11 
15 of Hartman as teaching: 

"acquiring a software package, said software package comprising: 

ajirst object, said first object a full-featured version of at least one 
software pro^tf, wherein said user is denied access to said first object; 

a second object, said second object a further version of said software 
20 product ha ving some , but less than all, of the features of said first object ." 

0 

The cited teaching merely describes the field of Hartmann's invention "a system for 
seamlessly processing encrypted and non-encrvpted data and instructions, and more 
particularly, to a data processing system that incorporates cryptographic architectural 
25 features that inhibit un authorized usage of encrypted media " Hartmann thus describes 
a processi ng unit that is capable of processing both encrypted and non-encrvpted data 

5 

Received from < 650 474 8401 > at 10122103 6:05:56 PM [Eastern Daylight Time] 



10/22/2003 WED 15:01 FAX 650 474 8401 GLENN PATENT GROUP 



0009/024 



and Instructions . "Seamlessly" presumably means that the user is unaware when the 
data and instructions processed are encrypted and when they are non-encrypted. The 
entire specification is devoted to a description of the processing unit, and the manner in 
which it process data and instructions. Virtually nothing is said about the media , nor is 
5 anything said about the ultimate use to which Hartmann's processing unit is to be put . 
There is thus no teaching or suggestion of a software package as described in Claim 1 . 
The Examiner is directed to Figure 1 of Hartmann. The media provider 10, encrypts 
(clear) media 17 to produce (encrypted) media 22, which is somehow delivered to 
remote processor 18. (Encrypted) media 22 is again shown in Figure 2. Beyond that, 
10 there is no description of the media. 17 or 22 that would lead one skilled in the art tg 
conclude that the software package of the Claimed invention was being described . 

Referring now to Figure 2 of Hartmann, each segment register 56 includes a field 60 
that indicates whether the data held in a particular register is encrypted or non- 
15 encrypted. The reference is completely silent as to where the non-encrvpted data 
comas from- Furthermore, the Claim ed invention has nothing to do with seamless 
processing of encrypted and non-encrvpted data . The Claimed invention relates to the 
evaluation of software for purchase, wherein the evaluation software is provided as a 
package, the package containing separate objects comprising an evaluation copy 
20 having a reduced feature set, and the full-featured version, wherein user access to the 
full-featured version is denied. 

Furthermore, there is no teaching or suggestion in Hartmann of "an access and control 
portion r said access and control portion affording selective access to any of said first 

25 and second objects " There is no teaching in Hartmann of first and second objects, or 
selective access to the objects. The Examiner is reminded that Hartmann provides 
seamless processing of encrypted and non-encrypted data. There is no access and 
control portion. The media provider 10 encrypts media 17, transmits it to the processor 
18, and transmits media master keys to processor 18 after receiving processor 18's 

30 public key (Figures 1 and 2). Where is the access and control portion of the software 
package? 

There is further no teaching in Hartmann of a notifier . As described above, Hartmann's 
"software p ackage" includes only the encrypted media . 

35 



6 



Received from < 650 474 8401 > at 10)22/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 WED 15:01 FAX 650 474 8401 GLENN PATENT GROUP 



©010/024 



There is no teaching in Hartmann of " installing said software package on said buyer's 
computer system ." While Hartman describes in detail how the encrypted media 22 is 
processed once it is received at processor 18 (Cols. 6 and 7) ttieireJsjno mention of 
permanently st oring the media or installing it at the processor 18 in any way . 

5 

There is no teaching In Hartmann of accessing said second object, access to said 
second object beino unrestricted . Because Hartmann doesn't teach first and second 
objects, it is impossible to teach a step of separately accessing a second object without 
accessing the first object. Furthermore, as previously pointed out, Hartmann is 
10 concerned with seamlessly processing encrypted and non-encrypted data and 
instructions. 

There is further no teaching in Hartmann of "evaluating said second object whereby said 
user assesses whether said software product meet s said user's requirements ." No user 
15 is ever mentioned in Hartmann, nor is there any indication of what use the decrypted 
data and instructions will be put to. 

B. Regarding Claim 2: There is no teaching in Hartmann of "wherein said access 
and control portion includes usage authorization information." As above, Hartmann 

20 doesn't provide an access and control portion or usage authorization information. 

C. Regarding Claim 6: There is no teaching or suggestion in Hartmann of "wherein 
said first object and said usage authorization information are encrypted , whereby said 
user is prevented from accessing and us ing said first object and said usage 

25 authorization information until said prospective user executes a purchase request , 
thereby acquiring a license to at least some of the rights to said software product ." As 
previously discussed, there are no first and second objects in Hartmann, nor is usage 
authorization information provided as part of the package. There is no suggestion of a 
user executing a purchase request. The only thing remotely resembling a purchase 

30 request Is the step of the processor 18 sending the public key 12, whereupon the media 
provider 10 furnishes the media master keys and media identifiers 16. However, 
Hartmann is merely describes an encryption scheme, it has nothing to do with 
distribution of software for evaluation by a prospective buyer. 



Received from < 650 474 8401 > at 10/22/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 WED 15:02 FAX 650 474 8401 GLE1 PATENT GROUP 



1011/024 



D. Regarding Claims 8-11. The Examiner's line of reasoning in finding Claims 8 - 
1 1 anticipated by Hartmann is completely unclear to Applicant. Hartmann neither 
teaches nor suggests usage authorization information that "specifies any of: 

permitted uses for said software product and individual components thereof and 
5 prices for said permitted uses: 

authorized extent of use, where said extent of use comprises any of duration of 
use and number of uses, and prices for said authorized extent of use: 

content of levels, where said software is purchased in succeeding levels, and 
prices fpr sfrjd levels; 

10 an authorized user for said softwa re product subsequent to purchase: and 

subsequent to pu rchase, which of said individual components and levels have 
been purchased, and which are still available for purchase." 

The only feature of Hartmann that remotely resembles the above are the media 
15 identifiers 16 that "identify the encrypted media " (Col 4, line 22 to line 23.) But nothing 
beyond this is said about them. 

E. Regarding Claims 13-16: Claims 13-16 describe the usage authorization 
information of Claims 9 and 1 1 in greater detail. As above, Hartmann doesn't even 

20 remotely suggest usage authorization information as taught by the invention. 

F. Regarding Claim 18 and 19: As above, Hartmann does not teach or suggest an 
evaluating step, nor is there any suggestion of purchasing anything. 

25 Therefore, the rejection of Claim and all Claims depending therefrom under 35 USC 
1 02(b) as being anticipated by Hartmann is deemed to be improper. 

5. Claims 17, 22 - 28 and 29 - 44 stand rejected under 35 USC 103(a) as being 
unpatentable over Molnar in view of U.S. Patent No; 5,598,470 ("Cooper"). Applicant 
30 respectfully disagrees. In view of the above, the cited references, either separately or in 



8 

Received from < 650 474 3401 > at 10122/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 ID 15:02 FAX 650 474 8401 GLENN PATENT GROUP 



©012/024 



combination fail to teach all features of the Claimed invention. Accordingly, the rejection 
of Claims 17 and 22 - 28 under 35 USC 103(a) is deemed to be improper. 

6. Claims 45 - 47 stand rejected under 35 USC 103(a) as being unpatentable over 
5 Molnar in view of U.S. Patent No* 6,006,328 ("Drake"). Applicant respectfully disagrees.* 
In view of the above, the cited references, either separately or in combination, fail to 
teach all features of the Claimed invention. Accordingly, the rejection of Claims 45 - 47 
under 35 USC 103(a) is deemed to be improper. 

10 7. Claims 48-51 stand rejected under 35 USC 103(a) as being unpatentable over 
Molnar in view of Cooper and further in view of Grantz. Applicant respectfully disagrees. 
In view of the above, the cited references, either separately or in combination, fail to 
teach all features of the Claimed invention. Accordingly, the rejection of Claims 48 - 51 
under 35 USC 103(a) is deemed to be improper. 

15 



Received from < 650 474 8401 > at 10122/03 6:06:56 PM [Eastern Daylight Time] 



9 



10/22/2003 ID 15:02 FAX 650 474 8401 GLENN PATENT GROUP 



1013/024 



CONCLUSION 



In view of the above, the application is deemed to be in allowable condition. Therefore, 
the Examiner is earnestly requested to withdraw all rejections and allow the application 
5 to pass to issue as a U. S. Patent. Should the Examiner have any questions related to 
the application, he is urged to contact applicant's attorney at the telephone number 
given below. 



10 



Respectfully submitted, 



RECEIVED 
CENTRAL RAX CENTER 

OCT 2 2 2003 





Michael A. Glenn 



Reg. No. 30,176 



15 



Customer No. 22862 



Received from < 650474 8401 > at 10)22/03 6:05:56 PM [Eastern Daylight Time] 



10 



10/22/2003 ffED 15:03 FAX 650 474 8401 GLENN PATENT GROUP 



CLAIM AMENDMENTS 



1. (Currently amended) A method of evaluating software by a user for subsequent 




5 purchase comprising the steps of: 

acquiring a software package, said software package comprising: 



a first object, said first object a full-featured version of at least one 
software product, wherein said user is denied access to said first object; 

a second object, said second object a further version of said software 
10 product having some, but less than all, of the features of said first object; 

an access and control portion, said access and control portion 
affording selective access to any of said first and second objects; and 
a notffier; 

installing said software package on said buyer's computer system r wh e r -e in -s a i d 
15 insta l lation comprise s running a s e tup rout i no ; 

accessing said second object, access to said second object being unrestricted; 

and 

evaluating said second object whereby said user assesses whether said software 
product meets said user's requirements. 

20 

2, (Original) The method of Claim 1, wherein said access and control portion 
includes usage authorization information. 



@014/#l# 



RECEIVED 
CBITML HOC CENTER 

OCT 2 2 2003 




Received from < 650 474 8401 > at 10122/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 ID 15:03 FAX 650 474 8401 GLENN PATENT GROUP 



@0 



3. (Original) The method of Claim 1, wherein said acquiring step comprises any of 
the steps of: 

acquiring said software package as a software copy on a recordable 

medium; 

5 acquiring said software package via data communication from any of an 

Internet site and a dial-up online service. 

4. (Original) The method of Claim 3, said acquiring step further comprising the step 
of saving said software package to a mass storage device in said user's computer. 

10 

5. (Original) The method of Claim 4, wherein said mass storage device comprises a 
hard disk drive. 

6. (Original) The method of Claim 2, wherein said first object and said usage 
15 authorization information are encrypted, whereby said user is prevented from accessing 

and using said first object and said usage authorization information until said 
prospective user executes a purchase request, thereby acquiring a license to at least 
some of the rights to said software product. 

20 7. (Original) The method of Claim 6, wherein said first object, said second object 
and said usage authorization information are macro-compressed and optionally, micro- 
compressed. 



12 



Received from < 650 474 8401 > at 10/22/03 6:06:56 PM [Eastern Daylight Time] 



10/22/20*03 WED 15:03 FAX 650 474 8401 GLENN PATENT GROUP 



1016/024 



8. (Original) The method of Claim 6, wherein said usage authorization information 
specifies any of: 

permitted uses for said software product and individual components thereof and 
prices for said permitted uses; 
5 authorized extent of use, where said extent of use comprises any of duration of 

use and number of uses, and prices for said authorized extent of use; 

content of levels, where said software is purchased in succeeding levels, and 
prices for said levels; 

an authorized user for said software product subsequent to purchase; and 
10 subsequent to purchase, which of said individual components and levels have 

been purchased, and which are still available for purchase. 

9. (Original) The method of Claim 8, wherein said software product comprises one 
or more executable objects. 

15 

10. (Original) The method of Claim 9, wherein said executable objects comprise any 
of application software, utilities, and computer games. 

1 1 . (Original) The method of Claim 8, wherein said software product comprises one 
20 or more data objects, 

12. (Original) The method of Claim 11, wherein said data objects comprise any of 
digital images, video data objects and audio data objects. 

13 

Received from < 650 474 8401 > at 10122/03 6:06:56 PM [Eastern Daylight Time] 




10/22/2003 WED 15:03 FAX 650 474 8401 GLENN PATENT GROUP 



@017/024 



13. (Original) The method of Claim 9 wherein said levels comprise versions of said 
executable objects having more features enabled than a version in a preceding 
increment. 



5 14. (Original) The method of Claim 9, wherein said increments comprise additional 
objects over those in a preceding increment 

15. (Original) The method of Claim 11, wherein said increments comprise additional 
objects over those in a preceding increment. 



16. (Original) The method of Claim 9, wherein said notifier comprises: 
an executable code section; and 

information required by said user for purchasing rights to said software product 
and enabling entry of transaction information required for said purchase of said rights. 



17. (Currently amended) The method of Claim 16, wherein said installing step 
comprises the steps of; 

loading said software package into the memory of said user's computer system; 

running a setup routine, wherein sard executable code section performs normal 
20 setup functions, including displaying a user license; and 
agreeing to terms of said user license. 

18. (Original) The method of Claim 16, wherein said evaluating step comprises the 




10 



15 



steps of: 



14 



Received from < 650 474 8401 > at 10122/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 WED 15:04 FAX 650 474 8401 GLENN PATENT GROUP 



selecting one or more use options from a listing of said use options available, 
said available options being those objects available free of charge or those previously 
purchased by said user, said listing being provided by said executable code section 
accessing said usage authorization information, and wherein one or more of said 
5 available objects are retrieved by said executable code section and loaded into 
memory; and 

executing said requested use. 

1 9. (Original) The method of Claim 1 8, further comprising the step of: 

10 purchasing any of said software product in entirety and one or more parts 

thereof. 

20. (Original) The method of Claim 1 9, wherein said purchasing step comprises the 
steps of: 

15 providing user information; 

optionally, electing usage levels and desired features; 
providing payment information; 

transmitting a purchase request to a server, said purchase request comprising 
said payment information and said desired usage information. 

20 

21. (Original) The method of Claim 20, wherein said payment information comprises 
credit card Information and contact information for said prospective purchaser. 



Received from < 650 474 8401 > at 10/22/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 ffED 15:04 FAX 650 474 8401 GLENN PATENT GROUP 



1019/024 



22. (Original) The method of Claim 21, wherein selected information characteristic of 
said user's computer system is transmitted to said server after said purchase request is 
received by said server 

5 23. (Original) The method of Claim 22, wherein said selected information includes 
serial numbers from any of a hard disk drive, a network interface card, and a mother 




board from said user's computer. 



24. (Original) The method of Claim 23, wherein said selected information includes an 
10 identification code identifying a particular storage medium on which said software 

package was distributed. 

25. (Original) The method of Claim 22, wherein said server transmits an access 
control code to said user's computer after said purchase request is successfully 

15 processed, said access control code based on said selected information characteristic 
of said user's computer, and wherein said access control code is separately stored on 
said user's computer from said software package. 

26. (Original) The method of Claim 25, wherein said access control code is a 
20 decryption key for said encrypted first object, said decryption key based on said 

selected information, and wherein both said decryption key and said selected 
Information must be present on said user's computer in order to decrypt said first object. 



16 



Received from < 650 474 8401 > at 10/22/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 WED 15:04 FAX 650 474 8401 GLENN PATENT GROUP 



1020/024 



27. (Original) The method of Claim 26, wherein said decryption key is split into two 
parts, a first part of which is calculated on said server, and a second part of which is 
calculated in real time on said user's computer using said selected information. 




10 



28. (Original) The method of Claim 25, wherein said access control code is a 
decryption executable for said encrypted first object, said decryption executable based 
on said selected information, and wherein both said decryption executable and said 
selected information must be present on said user's computer in order to decrypt said 
first software version. 

29. (Original) The method of Claim 11 , wherein said access control portion further 
comprises a signature, said signature being readable by a predetermined executable 
serving to control access to said first object. 



15 30. (Original) The method of Claim 29, wherein said predetermined executable is a 
driver executable, wherein said driver executable is downloaded from a server by said 
user; and 

wherein said driver executable is installed on said user's computer separately 
from said software package. 

20 

31 . (Original) The method of Claim 30, wherein said notifier comprises means for 
notifying said prospective user to download said driver executable from said server. 



17 



Received from < 650 474 8401 > at 10122/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 ffED 15:05 FAX 650 474 8401 GLENN PATENT GROUP 



©021/024 



32. (Original) The method of Claim 31, wherein said driver executable reads said 
signature and recognizes said software package as one containing data objects, 
wherein said software package requires access control by said driver executable. 

5 33. (Original) The method of Claim 32, wherein said driver executable decrypts said 
usage authorization information, whereby said usage authorization is presented to said 




user. 



34. (Original) The method of Claim 33, wherein said evaluating step further 
10 comprises the steps of; 

selecting one or more use options from a listing of said use options available, 
said available options being those objects available free of charge or those previously 
purchased by said user, said listing being provided by said driver executable accessing 
said usage authorization information, and wherein one or more of said available objects 
15 are retrieved by said driver executable and loaded into memory; and 

executing said requested use. 

35. (Original) The method of Claim 34, further comprising the step of; 
purchasing any of: 

20 said software product in entirety; and 

one or more parts thereof. 

36. (Original) The method of Claim 35, wherein said purchasing step comprises the 
steps of: 

18 



Received from < 650 474 8401 > at 10/22/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 ID 15:05 FAX 650 474 8401 GLE1 PATENT GROUP 



@022/024 



providing user information; 

optionally, electing usage levels and desired features; 
providing payment information; 

transmitting a purchase request to a server, said purchase request comprising 
5 said payment information and said desired usage information. 




37. (Original) The method of Claim 36, wherein said payment information comprises 



credit card information and contact information for said prospective purchaser. 

10 38. (Currently amended) The method of Claim 37, wherein selected information 
characteristic of said user's computer system is transmitted to said eati server r e c ei v es 
server after said purchase request. 

39. (Original) The method of Claim 38, wherein said selected information includes 
15 serial numbers from any of a hard disk drive, a network interface card, and a 

motherboard from said user's computer. 

40. (Original) The method of Claim 39, wherein said selected information includes an 
Identification code which identifies a particular storage medium on which said software 

20 package was distributed* 

41 . (Original) The method of Claim 38, wherein said server transmits an access 
control code to said user's computer after said purchase request is successfully 
processed, said acc ss control code based on said selected information characteristic 

19 



Received from < 650 474 8401 > at 10/22/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 WED 15:05 FAX 650 474 8401 GLENN PATENT GROUP 



1023/024 



of said user's computer, and wherein said access control code is separately stored on 
said user's computer from said software package. 

42. (Original) The method of Claim 41, wherein said access control code is a 
5 decryption key for said encrypted first object, said encryption key based on said 
selected information, and wherein both said decryption key and said selected 
information must be present on said user's computer in order to decrypt said first object. 

43. (Original) The method of Claim 42 wherein said encryption key is split into two 
10 parts, a first part of which is calculated on said server, and a second part of which is 

calculated in real time on said user's computer using said selected information. 

44. (Original) The method of Claim 43, wherein said access control code is a 
decryption executable for said encrypted first object, said encryption executable based 

15 on said selected information, and wherein both said decryption executable and said 
selected information must be present on said user's computer in order to decrypt said 
first software version. 

45. (Original) The method of Claim 1, wherein said software package includes 
20 means for protecting said software package against class attacks and dump attacks. 

46. (Original) The method of Claim 45, wherein said protection against dump attacks 
comprises any of erasing and modifying one or more of said objects 1 relocation 



20 



Received from < 650 474 8401 > at 10122/03 6:06:56 PM [Eastern Daylight Time] 



10/22/2003 WED 15:05 FAX 650 474 8401 GLE1 PATENT GROUP 



@024 



7024 



information, directory pointers, or entry point after said objects have been written into 
memory. 

47. (Original) The method of Claim 45, wherein said protection against dump attacks 
5 comprises modifying references to external routines in an import table of said objects 



48. (Original) The method of Claim 25, wherein said server inserts transaction 
information in said software product as a watermark. 

10 

49. (Original) The method of Claim 41, wherein said server Inserts transaction 
information in said software product as a watermark. 

50. (Original) The method of Claim 25, wherein said server inserts transaction 
15 Information in said access control code as a watermark. 

51. (Original) The method of Claim 41, wherein said server inserts transaction 
information in said access control code as a watermark. 



a 



whereby said notifier controls access to said routines. 



20 



21 



Received from < 650 474 8401 > at 10122103 0:06:56 PM [Eastern Daylight Time]